(Based on the secure routing protocol of A{0GECDSA algorithm, multi-hop security is terminated, and a simple cross-layer intrusion/intrusion viewing mechanism is used together, and specific design schemes and security analysis are proposed for each layer, which is the practice of wireless ad hoc network. Use Lay a Solid Root Blue
_rels\.rels)